๐ฅ Gate Square Event: #PTB Creative Contest# ๐ฅ
Post original content related to PTB, CandyDrop #77, or Launchpool on Gate Square for a chance to share 5,000 PTB rewards!
CandyDrop x PTB ๐ https://www.gate.com/zh/announcements/article/46922
PTB Launchpool is live ๐ https://www.gate.com/zh/announcements/article/46934
๐
Event Period: Sep 10, 2025 04:00 UTC โ Sep 14, 2025 16:00 UTC
๐ How to Participate:
Post original content related to PTB, CandyDrop, or Launchpool
Minimum 80 words
Add hashtag: #PTB Creative Contest#
Include CandyDrop or Launchpool participation screenshot
๐ Rewards:
๐ฅ 1st
Deep-Fake Zoom Call Leads to $1.35 Million Crypto Heist
In a chilling example of advanced cybercrime, the founder of THORChain and Vultisig, known as @jpthor, has reportedly lost $1.35 million in a sophisticated crypto hack involving a deep-fake Zoom call. The incident was exposed by Ledger's Chief Technology Officer, Charles Guillemet, who highlighted the hack as a critical warning for the entire cryptocurrency community. The attack began when a scammer, after compromising a friend's Telegram account, sent a malicious Zoom link for what appeared to be a genuine conference call.
The Mechanics of the Attack
The Zoom call itself was a deep-fake, an AI-generated imitation. The scammer's primary objective was to steal the victim's private keys, which were unfortunately stored in his iCloud Keychain. This gave the hackers a direct path to an old Metamask software wallet holding the crypto. The CTO of Ledger emphasized a crucial point about the hack: the victim did not need to sign any malicious transaction. The malware simply stole the private keys, demonstrating the extreme vulnerability of storing significant digital assets in software wallets. Guillemet's message to the crypto world was stark and clear: storing assets on a software wallet is a matter of "when, not if, you will be drained."
A Critical Security Reminder
The incident serves as a stark reminder of the evolving threats in the digital asset space. The use of deep-fake technology and the targeting of personal digital storage systems like iCloud Keychain represents a new level of sophistication for cybercriminals, possibly from groups in North Korea. Experts are reiterating the paramount importance of using hardware wallets, which keep private keys offline and physically separate from internet-connected devices, to protect digital assets from such advanced threats.